Overview #
The Meeting Host Authentication Flow is designed to provide controlled internet access to guests visiting an organization. Instead of open guest access, visitors must request approval from a meeting host, who then validates their login request before network access is granted.
This authentication method helps enhance security, monitor guest activity, and ensure compliance with corporate policies while offering a seamless login experience.
1. User Login Process #
1. Guest Login Request
- The guest accesses the Captive Portal and enters their name, email, and meeting host’s email.
- The guest must accept the Terms and Conditions & Privacy Policy before submitting the request.
2. Meeting Host Approval
- The designated meeting host receives a login request notification via email.
- The host can approve or reject the request via a provided link.
- Once approved, the guest receives a confirmation and is granted internet access.
3. Redirect & Session Control
- After approval, the guest is redirected to a pre-configured URL (e.g., company homepage or visitor guidelines).
- Access duration and policies are enforced based on configured settings.
2. Configuration & Customization #
Administrators can configure the Meeting Host Authentication module through the Admin Portal with the following options:
#
🔹 View & Managing Meeting Host and their guests:
📌 Sign In Administration → Sign In Modules → Meeting Host Logins
- Admins can view and manage guest login requests, including:
- Pending requests awaiting approval.
- Approved logins with session details.
- Expired or rejected requests.
🔹 Configuring Access Policies
📌 Sign In Administration → Access Policies
- Access policies define who can act as a meeting host and are managed through email or domain-based policies.
- Administrators can define session time limits and default expiration settings.
- Multiple access policies can run in parallel, each with:
- Different access durations for approved guests.
- Different default redirect URL can be modified to point to any desired destination after successful login.
- Domain filters to control which organizations’ employees can approve guest access.
- Email-based restrictions to define specific users as meeting hosts.
- Administrators can define session time limits and default expiration settings.
The default redirect URL can be modified to point to any desired destination after successful login.
The Captive Portal can be customized to include custom messages on the specific login tab.
🔹 Configuring Captive Portal UI
📌 Sign In Administration → Login Portal → Portal Configurations → Meeting Host Settings
- Customize the login page text, including instructions and branding.
3. Security & Compliance Considerations #
- Host-Based Access Control – Ensures that only guests approved by an internal contact can access the network.
- Terms and Conditions Compliance – Guests must acknowledge terms & privacy policies before requesting access.
- Activity Monitoring – Admins can track login history and guest sessions via the Admin Portal.
- Automated Expiration – Guest sessions automatically expire based on configured access policies, reducing security risks.
Benefits of Meeting Host Authentication #
✅ Enhanced Security – Access is granted only to approved guests, reducing unauthorized use.
✅ User-Friendly Approval Process – Meeting hosts can quickly approve or deny requests via email.
✅ Policy-Based Access Management – Admins can define access policies per host, domain, or guest type.
✅ Improved Compliance – Guest activity is logged and managed for security and regulatory compliance.
✅ Seamless Guest Experience – Visitors can connect without requiring personal credentials while ensuring security.
With the Meeting Host Authentication Flow, organizations can securely manage guest access, reduce administrative overhead, and ensure compliance with company policies. 🚀